HACKERLOI.pdf

Поділитися
Вставка
  • Опубліковано 24 січ 2025

КОМЕНТАРІ • 1,2 тис.

  • @LoiLiangYang
    @LoiLiangYang  3 роки тому +390

    :)

  • @faceitlevel1035
    @faceitlevel1035 3 роки тому +988

    Ay yes, now I can send my "Home work" to my teacher.

    • @causalguide
      @causalguide 3 роки тому +54

      Yeah "home work"

    • @causalguide
      @causalguide 3 роки тому +35

      Yeah "home work"

    • @electrohacker284
      @electrohacker284 3 роки тому +8

      🤣🤣🤣

    • @flallal8543
      @flallal8543 3 роки тому +34

      Ah yes, you just copied the same comment from Lio lang's malicous pdf video from 3 years ago and also doing this will get you expelled and arrested.

    • @GAMERICEKING
      @GAMERICEKING 3 роки тому +3

      , 😂

  • @rahulprajapati9324
    @rahulprajapati9324 3 роки тому +208

    This is really scary.. Thank you for spreading such amazing knowledge.

    • @rafimr5751
      @rafimr5751 3 роки тому +13

      This very old hacking 🙂
      But now hackers can do more scary things 🙂

    • @rahulprajapati9324
      @rahulprajapati9324 3 роки тому +1

      @@rafimr5751 Ohh

    • @AmanKumar-hy5ck
      @AmanKumar-hy5ck 3 роки тому

      @@rafimr5751 like what i really want to know just tell me the names

    • @rafimr5751
      @rafimr5751 3 роки тому +1

      @@AmanKumar-hy5ck I can mine cryptocurrency on you device 😋

    • @rafimr5751
      @rafimr5751 3 роки тому +1

      @@AmanKumar-hy5ck for that check my bio 🙂

  • @abdeslam_blc
    @abdeslam_blc 3 роки тому +60

    i love the simplicity of your tutorials, keep going !

  • @Osman.B
    @Osman.B 3 роки тому +34

    My favorite channel! Thank you Loi Liang Yang!

  • @ebeneizermaluleke3459
    @ebeneizermaluleke3459 3 роки тому +45

    i love this channel, you make things easy

    • @sbypasser819
      @sbypasser819 3 роки тому +1

      they ARE easy if he uses them on this channel

  • @shadowcbt3910
    @shadowcbt3910 3 роки тому +7

    Best in the game... Fav channel of all time... Much love 🔥🔥🔥

  • @abd-elrahmanmahmoud3167
    @abd-elrahmanmahmoud3167 3 роки тому +35

    mr loi you are really genius,
    love your content and ur way of simplifying the information

    • @bennysepp8412
      @bennysepp8412 3 роки тому

      @Y K why not?

    • @sbypasser819
      @sbypasser819 3 роки тому

      no

    • @bennysepp8412
      @bennysepp8412 3 роки тому +1

      @Y K so just because he does a little easier tutorials, he's a script kiddy?

    • @bennysepp8412
      @bennysepp8412 3 роки тому

      ​@Y K Yes, there is. but that's not really the point. You can't just claim that someone is something without knowing anything. Thats just hating ^^

    • @bennysepp8412
      @bennysepp8412 3 роки тому

      @Y K 7, almost 8

  • @Suneeh1338
    @Suneeh1338 3 роки тому +45

    well.. 5:01 is the most important part. If you read WHAT you are opening there you will be just fine. Also, if you have the file in any other directory (in this case) you would not be trapped in a TCP reverse shell would you?

    • @broz36_
      @broz36_ 3 роки тому +14

      He's making real tutorials and all but he doesn't mention all that stuff on purpose, if you want to learn from him you are going to learn just the base (basically how to be a skid) and then you'll need to check yourself how to bypass all the other sh!t.

    • @Suneeh1338
      @Suneeh1338 3 роки тому +3

      @@broz36_ i know bro. but many ppl here are conviced that there is nothing the target can do.

    • @broz36_
      @broz36_ 3 роки тому +9

      @@Suneeh1338 Yeah, he has to do something about it.
      I mean, what can WE (the avarege viewer) can do about it?
      It's not like you can make a YT channel and post the real sh!t there because it's gonna get taken down. (NullByte tried that)
      Maybe making it into some puzzle so that only people that aren't just some "average viewers" can access and that will be outside of YT so it won't promote any illegal activities?

    • @pervysage4595
      @pervysage4595 3 роки тому +2

      @@broz36_ exactly.

    • @maxsilvester1327
      @maxsilvester1327 3 роки тому +3

      This exploit seems to be just for adobe reader, so you can just use firefox or microsoft edge (which is the default pdf reader on windows) to view the pdf

  • @alphaghost9672
    @alphaghost9672 3 роки тому +60

    I Would Definitely open this file.
    In my organization's production server.

    • @BARRY725
      @BARRY725 9 місяців тому +1

      RIP✋️💀

  • @DXWRATH
    @DXWRATH 3 роки тому +7

    Mr. Loi you have amazing brain and amazing way to learn us how we do it, THANK YOU.

    • @sbypasser819
      @sbypasser819 3 роки тому

      you can learn all he says from manual of the programs

    • @lucaabg3796
      @lucaabg3796 2 роки тому +1

      @@sbypasser819 where is that manual?

  • @ninjaassassin5801
    @ninjaassassin5801 Рік тому +1

    There’s is few of questions I need to ask you which can a iPhone be used to do ethical hacking using ISH or etc? What about even a Chromebook tablet? Also how can someone get data from the air?
    Also forgot to ask is it possible for someone with ADHD to become one of the best hackers? Currently struggling honestly even trying to make decent living but not giving up hope yet. Thanks I feel like your the best person to answer this honestly and one of my favorite teachers here on UA-cam.

  • @fndrsm
    @fndrsm 3 роки тому +43

    Its only happen when the firewall and antivirus is disabled right? So keep your firewall and antivirus active and updated.

    • @Motoxrides
      @Motoxrides 3 роки тому +13

      Well, a virus can add itself to exception and bypass those stuff so who knows. Never safe to completely just trust your anti-virus

    • @danawhite7361
      @danawhite7361 3 роки тому +5

      @@Motoxrides a virus can not add itself an exception, the user needs to allow that exception xd..so...

    • @TVPInterpolation
      @TVPInterpolation 3 роки тому +3

      @@danawhite7361 you haven ever seen viruses that did that? "The PC Security Channel" talked about such a virus a few years back.

    • @sbypasser819
      @sbypasser819 3 роки тому

      @@TVPInterpolation need admin! user needs to agree

    • @L2002
      @L2002 3 роки тому +9

      this video is so misleading. he's also using Adobe Reader 8.1, which means June 2007!!!! can you believe that?!

  • @lifelessons4698
    @lifelessons4698 2 роки тому +1

    You the best of the best .much love from South Africa

  • @raixnmd
    @raixnmd 3 роки тому +6

    Mr. Loi, i love this channel can you make a full explanation of how to use CVSS in every type of metric, thank you!.

  • @dot_dot_pwn2650
    @dot_dot_pwn2650 3 роки тому +2

    HackerLoi you are my favorite Hacker to watch, you go through things quickly and precisely. Great job man.

    • @clarkcodm9263
      @clarkcodm9263 3 роки тому

      Same

    • @addicted3105
      @addicted3105 3 роки тому

      Please tell how to stop accessing the pc, like how can i stop accessing my own pc. ik its weird question but at least tell me.

    • @jarrellidk
      @jarrellidk 3 роки тому

      @@zipp5022 If they already opened it that will do nothing.

    • @jarrellidk
      @jarrellidk 3 роки тому

      @@addicted3105 You can go back to a previous version of your machine, assuming you're using windows.

  • @ar-cielstarlingnemesis2146
    @ar-cielstarlingnemesis2146 3 роки тому +6

    I hope there will be a tutorial of how to detect if something happens to the user like this or a solution to avoid it like setting configuration or something. This makes me aware that not all doc/pdf files is safe. I wonder if this method is also applicable to videos. Like, when opening a video, it is also possible to get hacked.

    • @SunBlade4302
      @SunBlade4302 3 роки тому +6

      I'm pretty sure that windows defender will block it

    • @Suneeh1338
      @Suneeh1338 3 роки тому +5

      @@SunBlade4302 5:01 in the video.. he just accepts everything and OPENS it.. just read what you open guys :D

    • @L2002
      @L2002 3 роки тому +5

      don't worry at all, this video is misleading. he was using Adobe Reader 8.1 (Release Date: June 2007). are you kidding me, 2007?

    • @peterpetr5357
      @peterpetr5357 2 роки тому

      Yup even when opening an image
      But its not that easy so not anyone can do it
      And to be safe open unknown sources files on vps or rdp

  • @almatsumalmaadi8103
    @almatsumalmaadi8103 3 роки тому +10

    Loi we want tutorials about hacking android phones, because they are the most uesd phones in the space 😁.
    Guys hit like to rise up my comment

    • @L2002
      @L2002 3 роки тому

      he will not, he just showed you an outdated exploit, look at the video, he was using Adobe Reader 8.1 (Release Date: June 2007).

    • @Daniel-yt7ry
      @Daniel-yt7ry 2 роки тому

      @@L2002 the fact that the viewer is outdated says literally nothing about the exploit itself

    • @Macfreed
      @Macfreed 2 роки тому

      @@Daniel-yt7ry TYL3R DURD3N

  • @arunprakashm8126
    @arunprakashm8126 3 роки тому +14

    where pdf is stored?

  • @nuhluosman9008
    @nuhluosman9008 3 місяці тому

    Excellent Mr. Hackerloi. Your the best

  • @GameReality
    @GameReality 3 роки тому +3

    Amazing information. Love your videos. Regards from Sweden

  • @CashKhonshu
    @CashKhonshu Рік тому +6

    I love your videos but it would be nice to mention that you will have to first convince the victim to disable windows defender or do it yourself in any way :)

    • @FitnessTrainer101
      @FitnessTrainer101 Рік тому

      Is there a work around so that windows defender does not pick it up?

    • @_hzh_
      @_hzh_ Рік тому

      a normal payload can bypass windows defender but for pdf idk

  • @terminator2513
    @terminator2513 3 роки тому +4

    Love you man, and thanks for yet another amazing video.

  • @AutomotiveWorld-k2q
    @AutomotiveWorld-k2q 4 місяці тому

    Oh my boss im Just coming watched u ❤❤❤❤ 😂😂# Edy

  • @tonycheung7624
    @tonycheung7624 3 роки тому +3

    when i set the playload how can i know the playload's file location?
    and how can i know the email send to the target (demo)

  • @tonnyandre4776
    @tonnyandre4776 2 роки тому +2

    Great man, learning a litle every vídeo....thanks

  • @hugovera1540
    @hugovera1540 2 роки тому +6

    How long does it take to payload generation to complete? It seems for me it takes a very long time or is just looping indefinently both with ubuntu and kali linux

    • @vincentcj7548
      @vincentcj7548 2 роки тому +1

      I thought it was only mine, I've tried several times but it keeps generating with no results for minutes/hour

    • @shreyashkawade9470
      @shreyashkawade9470 2 роки тому +1

      @@vincentcj7548 yes

  • @jahblessaj6054
    @jahblessaj6054 3 роки тому +3

    Always motivated by your tutorials

  • @rubenverster250
    @rubenverster250 3 роки тому +14

    Next time I'm sending out CVs for job applications, I'm going to use this XP

  • @P1T4Bot
    @P1T4Bot 3 роки тому +3

    If I use my Android Galaxy S9, rooted & with AFWall+ installed, will opening the pdf-file still be as malicious, as it was shown here?

  • @younesmessaoudi1440
    @younesmessaoudi1440 3 роки тому +3

    why you never use obfuscation, in the real world everybody has at least windows defender enabled.
    and these payloads are easy to detect.

  • @basantsub1234
    @basantsub1234 4 місяці тому

    For those figuring out where the generated pdf is saved, the path is /root/.set

  • @jacque7357
    @jacque7357 3 роки тому +3

    this is just amazing than i expected, i love it

  • @mithunhazrabd
    @mithunhazrabd 3 роки тому

    You are great boss. Love from Bangladesh :)

  • @varunkarthick6253
    @varunkarthick6253 3 роки тому +3

    Sir, I don't know the path of the file "HACKERLOI.pdf" you created in the video.where is it....???

    • @MATRIX-bg5qr
      @MATRIX-bg5qr 3 роки тому +1

      Me too i don't know where is the PDF file

    • @felipearbelaez1360
      @felipearbelaez1360 3 роки тому

      I have the same question, someone know where is it?

    • @padmakumar.m.p1361
      @padmakumar.m.p1361 3 роки тому

      @@felipearbelaez1360 just make a new document in the desktop and give it a name and embedd the payload inside that, thats it

    • @sarcasticsoul2603
      @sarcasticsoul2603 3 місяці тому

      Create black instead

  • @kattynip0
    @kattynip0 3 роки тому

    Old intro was dope. Bring it back please

  • @qaiserkhan4860
    @qaiserkhan4860 3 роки тому +2

    Amazing content . Thts all we can do in virtual environment. How can we get a meterpreter session for a device that is connected to public network i,e the internet.

  • @wixlogo
    @wixlogo 3 роки тому

    5:01 well windows allready warns you about it, so read any pop up showed then click after reading carefully

  • @zionstemple
    @zionstemple 3 роки тому +7

    Would love to hear a good tutorial on obfuscation, AV catches most of the stuff from SE

    • @brodierobson4490
      @brodierobson4490 3 роки тому

      thats the where you need to learn to code comes in.

    • @zionstemple
      @zionstemple 3 роки тому +1

      @@brodierobson4490 I'm guessing you work in education or a consultant or something. I agree that coding is important, but you can be in infosec with out being a strong coder. Obviously some python is important.

  • @MalluDiscoveryTV
    @MalluDiscoveryTV 3 роки тому

    Hackeroli 😂❤️

  • @WhiteDevil-wi5bv
    @WhiteDevil-wi5bv 3 роки тому +3

    Handsome hacker indeed👀

    • @addicted3105
      @addicted3105 3 роки тому

      Please tell how to stop accessing the pc, like how can i stop accessing my own pc. ik its weird question but at least tell me.

  • @flavor-journey-p9q
    @flavor-journey-p9q 3 роки тому

    Best Video ❤️, BTW I am First

  • @mrgamerplays
    @mrgamerplays 3 роки тому +7

    What i do if i see you in my city

    • @ramzanm45
      @ramzanm45 3 роки тому +5

      Run away

    • @mayankgg1
      @mayankgg1 Рік тому

      Just run don't look back
      And hide your phone 😂

  • @Worexon
    @Worexon 3 роки тому

    Like your channel/videos!! Keep it up!! What keyboard do you use? Like the sounds of the typing :)

  • @HarshdeepSingh-lw1tl
    @HarshdeepSingh-lw1tl 2 роки тому +4

    Can you tell where the file is stored so that I can send that pdf

  • @SalilIlme
    @SalilIlme 3 роки тому

    I am proud to be your first like.

  • @l74123
    @l74123 3 роки тому +4

    Thank you for your video. Can we have more details on the technical part ?
    A pdf isn't supposed to be able to handle an .exe files.
    How does the trick work ?

    • @L2002
      @L2002 3 роки тому

      idk, but i think he's showing us an outdated exploit without any notes to gain views, if you look at the video carefully, he was using Adobe Reader 8.1 (Date: June 2007).??? 2007 Seriously???

    • @OpenYoureyes304
      @OpenYoureyes304 2 роки тому

      @@L2002 this is for educational purposes only of course he wont teach stuff that you can exploit you should have common sense if you want to be a real hacker

    • @L2002
      @L2002 2 роки тому

      @@OpenYoureyes304 i know that, but at least he should say if the exploit is outdated or now

  • @AshishBisht-mj7pi
    @AshishBisht-mj7pi 3 роки тому +2

    Thankyou so much sir for giving us these knowledgeable video

  • @nbamol5453
    @nbamol5453 3 роки тому +9

    it already gets detected by windows defender ,,,, no use

    • @renderset2937
      @renderset2937 3 роки тому +2

      yeah bro every msfvenom payload gets detected by antivirus gotta find the new way

    • @nbamol5453
      @nbamol5453 3 роки тому

      @@renderset2937 True

    • @Paul-gk8wk
      @Paul-gk8wk 3 роки тому

      @@renderset2937 you can make the metaspliote payload undetected by obfuscation

    • @Rahul-nw5rp
      @Rahul-nw5rp 2 роки тому

      Do you know where the file is being saved after renaming it. I can't find it bro.

    • @nbamol5453
      @nbamol5453 2 роки тому

      @@Rahul-nw5rp Google it

  • @sarcasticsoul2603
    @sarcasticsoul2603 3 місяці тому

    You're not revealing some codes. Is there any course of yours? In which u have. Taught clearly everything? Because UA-cam have restrictions I can understand that,
    I have seen many people, teaching ethical hacking, but I want to learn from you , you're experienced, I want to connect with you please reply

  • @anshumishra9368
    @anshumishra9368 3 роки тому +5

    Thanks for teaching us real hacking ❤

    • @saft2529
      @saft2529 3 роки тому

      thats ethical hacking

    • @SK-me9by
      @SK-me9by 3 роки тому

      It's good to know this stuff but, any script kiddie can do this just as we are learning it or using it as a quick reminder/reference. To be a real hacker takes much more then using someone else tools.

    • @saft2529
      @saft2529 3 роки тому

      @@SK-me9by to be real hacker you need to enable screen blocking and you need to know the keybinds for opening the system prompt function in hai.dll

  • @blackhathacking9103
    @blackhathacking9103 6 місяців тому +1

    Mr Loi your video really helpful

  • @manicsurfing
    @manicsurfing 3 роки тому +6

    Loi should be protected at all costs!

    • @sbypasser819
      @sbypasser819 3 роки тому

      why? what he says can be learned from text sources

    • @L2002
      @L2002 3 роки тому +1

      @@sbypasser819 not only that, he was using Adobe Reader 8.1 (Release Date: June 2007), 2007!!!

  • @The12300786
    @The12300786 9 місяців тому

    Excited to see android pdf Exploit 😮

  • @mikevinitsky8506
    @mikevinitsky8506 3 роки тому +2

    Loi, won't Antivirus programs stop any pdf with an exe or some pdfs with exe attached the Antivirus programs will allow to pass if you crypt it properly with a never before seen crypter? Loi please answer.

    • @pervysage4595
      @pervysage4595 3 роки тому

      there are encrypters for pdf files

    • @mikevinitsky8506
      @mikevinitsky8506 3 роки тому

      @@pervysage4595 Can you tell me the name of one or more pdf encrypters? So what do they do? They will literally encrypt the pdf and the exe and make it look like what type of file to Antivirus programs?

    • @edmorris4720
      @edmorris4720 2 роки тому

      @@mikevinitsky8506 you need to know basics of coding here, u can’t just use skid software abs expect to bypass av

    • @mikevinitsky8506
      @mikevinitsky8506 2 роки тому

      @@edmorris4720 I'm a programmer. What is skid software?

    • @edmorris4720
      @edmorris4720 2 роки тому

      @@mikevinitsky8506 lmao it means script kiddie. someone who uses other ppls stuff to hack and doesn’t write there own. like this backdoor maker. it won’t bypass av

  • @SharifulIslam-fp4yk
    @SharifulIslam-fp4yk 2 роки тому +1

    But the pdf file is fishy since it prompts with some suspicious message before opening. How to avoid this?

  • @dionwebiaswara7810
    @dionwebiaswara7810 3 роки тому +1

    Loi, in this videos we have know the target IP address. How to reconaissance the IP address which the target is in internet such as using smartphone, tablet, etc. Thanks

    • @kunjjoshi2765
      @kunjjoshi2765 2 роки тому

      Once we get the IP, we can run the nmap command with -O option for OS Detection

  • @officewires518
    @officewires518 3 роки тому +1

    how to find the path of the pdf we renamed please i didnt find it on desktop , thanks , and i appreaciate your work

  • @cx404v1
    @cx404v1 2 роки тому +1

    I would guess that this is not a persistent connection, right. Once the windows box is rebooted, the exploit dies unless pdf is opened again.

    • @yazel7090
      @yazel7090 2 роки тому

      what is this tutorial for if the pdf is detected by all anti virus

  • @antarsantana8976
    @antarsantana8976 3 роки тому +1

    well done loi excellente expérience bonne continuation

  • @rivu____2329
    @rivu____2329 2 роки тому +1

    infinite message "Waiting for payload generation to complete..." Could you fix that issue??

  • @Dr.ChrisMartins
    @Dr.ChrisMartins Рік тому

    Nice lecture. But my question is what about if you host your payload on a web host, how do you build with it instead of creating a new payload on Kali. Can you make a video on it?

  • @JohnRubenIndia
    @JohnRubenIndia 2 роки тому +1

    Can an internet security or an antivirus be able to stop this attack ? Say Kaspersky or Macafee ?

  • @jacobdebrone
    @jacobdebrone Рік тому

    its time to go to more advanced topics. I would like a video on how to create a botnet

  • @bananarama1
    @bananarama1 3 роки тому

    Not to be bitching, because i really like your video. It's good that you inform the public about these things. Thanks! But a 6 character password you type in at sudo? Unless that's with special chars only (not in rainbow tables) it's pretty darn short.

  • @afsarikhanum
    @afsarikhanum 3 роки тому +1

    Loi pls pls make video on brute forcing ssh, rlogin. Pls make video on Hydra u explain very well

  • @bishop6903
    @bishop6903 3 роки тому +2

    But the pdf payload don’t work on all pdf reader, just old versions who don’t fix the exploit

    • @L2002
      @L2002 3 роки тому

      you are right, he was using Adobe Reader 8.1 (Release Date: June 2007). this is ridiculous, he should have mentioned that the exploit is outdated. 2007?!

    • @kevinshehu4403
      @kevinshehu4403 2 роки тому +1

      Another click bait. None of the guys commenting has tried it out and in order for this to work must be Adobe Reader 8.1. We are in 2022 cmon

  • @Z-HACKER-x8g
    @Z-HACKER-x8g Рік тому +1

    i realy like all your video i watch to all your video but how about samething new like pdf attack on android this will be really cool if you can do that and thankes you

  • @mantavyapurohit1538
    @mantavyapurohit1538 3 роки тому +2

    3:30....after renaming the pdf file, how can I access it or find it??, so that I can mail it to user.

    • @ahinssu617
      @ahinssu617 3 роки тому

      have you fixed?

    • @mantavyapurohit1538
      @mantavyapurohit1538 3 роки тому +2

      @@ahinssu617 no still can't find the file, did you?

    • @martinsuperfind7779
      @martinsuperfind7779 3 роки тому +2

      same problem, If you have fixed message me please :)

    • @ahinssu617
      @ahinssu617 3 роки тому

      ​@@martinsuperfind7779 i think i figured it out i havent tested but your target has to be in the same exact network. you portfoward your network to avoid this. or host it on ngrok

    • @ahinssu617
      @ahinssu617 3 роки тому

      @@mantavyapurohit1538 i think i figured it out i havent tested but your target has to be in the same exact network. you portfoward your network to avoid this. or host it on ngrok

  • @mr.zero-zone
    @mr.zero-zone Рік тому +1

    I want to know without showing the permission pop up , taking access of CMD is possible or not? I know its possible but how

  • @Gaz9897
    @Gaz9897 3 роки тому

    Full
    Complete
    Control
    Entire
    Computer
    System
    n i c e

  • @traderx6393
    @traderx6393 3 роки тому

    Hello there i just wanna clarify some things..first does the victim and the hacker should on the same network?
    Secondly can we do this method on an android?
    I am kindly waiting for your answer and thank you allot bro your videos are helpful and legit

    • @kevinmccallister7647
      @kevinmccallister7647 3 роки тому +1

      If you don't have port forwarding turned on they need to be in the same network

    • @traderx6393
      @traderx6393 3 роки тому +2

      @@kevinmccallister7647 got it thanks allot brother

    • @padmakumar.m.p1361
      @padmakumar.m.p1361 3 роки тому

      @@kevinmccallister7647 or just upload the file to google drive and after uploading right click on the uploaded file and click share or get link thats it

  • @marcforce7387
    @marcforce7387 Рік тому +2

    Did not see where to get the pdf after downloading it

  • @snowsofty
    @snowsofty 3 роки тому +1

    wrold cute and intelligent hacker i love your voice and you you are my inspection

  • @TusharSharmaVats
    @TusharSharmaVats Рік тому +2

    this taking so much time for generating payload

  • @ctcypher4577
    @ctcypher4577 3 роки тому +2

    is it detectable by windows defender or other antiviruses??

  • @brainthesizeofplanet
    @brainthesizeofplanet 3 роки тому

    Phew that seems easy....and scary...
    However Adobe "asked"/informed the user that the PDF opened "cmd" (you clicked so fast it was hard t read) and I really hope that any decent antivirus would a the very least stop the attack now, but better when opening the PDF
    right?

  • @MATRIX-bg5qr
    @MATRIX-bg5qr 3 роки тому +2

    Do you know where the PDF file saved?

  • @foxtravor2091
    @foxtravor2091 2 роки тому

    Thanks you.
    please I have a question
    1. if the pdf file was opened on a smartphone it will be controllesd also?

  • @mrjudge7034
    @mrjudge7034 2 роки тому +2

    First of all, thank you for the video. I have a question, what if the person closes the pdf? Do we still have access to the victim's device?

    • @fedo9644
      @fedo9644 2 роки тому +1

      yes, you have access to the pc until they shut it down, or disconnect wifi/ethernet

    • @mrjudge7034
      @mrjudge7034 2 роки тому

      @@fedo9644 Thank you.

    • @kerhabplays
      @kerhabplays 2 роки тому

      @@fedo9644 Did the WiFi connection has to be the same as you are connected??

    • @duckypi-qc5ec
      @duckypi-qc5ec 2 роки тому

      @@kerhabplays no in meterpreter case its offline attack so no internet needed

  • @0menacing
    @0menacing Рік тому +1

    I opened up the file but nothing appeared in the terminal

  • @notholdini2740
    @notholdini2740 2 роки тому +1

    Everytime i get a payload is saves it to a root folder which i cant axcess any fixes?

  • @imranmyth9558
    @imranmyth9558 3 роки тому +1

    Can I get rid of the problem by delete it or move to trash bin?

  • @iitianankit8932
    @iitianankit8932 2 роки тому

    I rickrolled my teacher with this method in the lockdown lmao

  • @AJ79
    @AJ79 2 роки тому

    run the kali linux hacking os on any phone is no longer available bruh

  • @Soull-f3y
    @Soull-f3y 3 роки тому +1

    Intro song changed......😊

  • @moadhbaklouti2214
    @moadhbaklouti2214 2 роки тому +1

    Due the issue of sending email Where can i find the new file

  • @gad45678
    @gad45678 2 місяці тому

    And the port forwarding? Unless you do it, it will only work in a LAN...

  • @freeforyou3796
    @freeforyou3796 2 роки тому +2

    Hi
    can any one tell me where can i find the pdf that i just made.
    I dont find it

  • @stass7507
    @stass7507 3 роки тому +1

    I HAVE LINUX RUNNING IS A VM, WHERE DO I FIND THE PDF I CREATED??

  • @valiouss1692
    @valiouss1692 2 роки тому +1

    If a hacker did this would a factory reset remove the problem?

  • @FelicePerna
    @FelicePerna 2 роки тому

    Hi Loi, interssing but is a play for begginer create pdf malicious backdoor....you have explain what we can encode the PDF for AV. advanced tecnic for encoding...the shikata_ga_nai encode and other are old..and all AV detected. Explain some manual mode for encode PDF undetected sure.

  • @NOT_GAMER_BD
    @NOT_GAMER_BD 2 місяці тому

    What is i close my oc after nake pdf and while closing my terget open the file so i get the access?

  • @ChintuChintu-sb4ox
    @ChintuChintu-sb4ox 3 роки тому +1

    Where will be the renamed file stored or it just changes the original file name.

  • @andrew_tate1
    @andrew_tate1 2 роки тому +1

    Atlast i found where the file is stored

  • @vishalkanojia9634
    @vishalkanojia9634 Рік тому

    Simple, efficient and learning from someone who is HANDSOME😂😂😂.... But while I was experimenting with it I thought if the payload is created where its stored but since I wasn't able to find it. I tried mailing it directly to test but Error popped up saying DisplayName was not mentioned.... Any suggestions..??

  • @Thana-Kit
    @Thana-Kit Рік тому

    The main point is Even if the file has already been loaded onto the device, but not enabled that file Computers will still not have the risk of being controlled,am i correct?

  • @vegetable9542
    @vegetable9542 3 роки тому

    Setoolkit says it's done creating/editing the PDF but there is still no PDF anywhere. Why is this?

  • @nole_1471
    @nole_1471 3 роки тому

    When we sending a pdf document like in the video should we wait on the Kali Linux terminal ? Or we can close our laptop then re-open Kali *imagine* 2 hours after the victim open the doc and will it work?

  • @JessieS
    @JessieS 3 роки тому

    Nice I am going to open that hackerloi right now!!!!